Logo
Syntricate Technologies

Information Security Engineer

Syntricate Technologies, Memphis, Tennessee, us, 37544


Please take a moment to review the job description below. If you are interested in applying, please reply to this email so we can discuss it further. This is a

Contract

position,

and we offer payment options of

C2C

and W2 & 1099 per hour. The interview process will be initiated as soon as possible. We are excited to hear back from you.

Job Description: Role:

Information Security Engineer Location:- Memphis, TN -

(NOT open to remote. Local to Memphis area candidates only) Duration: - 6 months+ Schedule: Monday - Friday | 8 - 5 pm Weekly Onsite Cadence:

Hybrid Schedule onsite 3xs a week (Tuesday & Wednesday will be required)

The Information Security Engineer will be a part of the Enterprise Identity team, focused to mature the program using both Okta (IAM) and SailPoint (governance). This position will work within a team of professionals to tackle key initiatives such as automating mover, joiner, leaver activities and streamline the user experience. Proficiency in OTKA and SailPoint REQUIRED. ESSENTIAL JOB FUNCTIONS Responsible for implementing, maintaining, monitoring, and managing secure solutions. The engineer delivers these solutions in accordance with the organization's architectural designs, best practices, and regulatory or compliance requirements. Reporting to the Director Information Security and is expected to contribute to the corporate security strategy with security leadership and other senior security technologists. Recipients of the engineer's implementations and management include ITS infrastructure, application development, security operations, security audit and end users. With an emphasis on securing systems, applications, third-party connections, service providers and ancillary systems, the Information Security Engineer is responsible for securing business-to-business initiatives, third-party relationships, outsourced solutions and vendors. Considered a highly knowledgeable individual, the Information Security Engineer is expected to implement, monitor and manage secure solutions that address modern day issues. Ideal Candidate Profile

Seasoned cyber security professional specializing in identity and access management/governance.

Top Skills Required (in order of preference)

Identity and access management experience specifically in Okta. Identity governance experience with SailPoint, Okta, or similar. Ability to communicate effectively and work in a team environment

Years of experience

Preferably at least 7+ years' experience in cybersecurity, including compliance and risk management with a system and network security engineering background. Highly technical and analytical expertise, with a proven deep background (preferred 5+ years' ITS experience in addition to cybersecurity) in technology design, implementation, and delivery. REQUIREMENTS

Bachelor's degree in computer science, information assurance, MIS or related field, or equivalent. Preferred (not required):

CISSP, CISM and/or SANS certification a plus. Preferably at least 7+ years' experience in cybersecurity, including compliance and risk management with a system and network security engineering background. Highly technical and analytical expertise, with a proven deep background (preferred 5+ years' ITS experience in addition to cybersecurity) in technology design, implementation and delivery. Experience with purple teaming (red and blue) to train, identify and remediate issues cohesively. Experience in cloud computing technologies, including software-, infrastructure and platform-as-a-service, as well as public, private, and hybrid environments. Extensive knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls. Skilled in meeting vulnerability and penetration testing requirements. Excellence in communicating business risk from cybersecurity issues. Experience managing SIEM systems, threat intelligence platforms, security automation and orchestration solutions, IDS/IPS, file integrity monitoring (FIM), data loss prevention (DLP) and other network and system monitoring tools. Track record of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively. Responsibilities

Handle day-to-day implementation, monitoring and operational support of hardware, software, customer applications, managed solutions and service provider relationships. Actively participate and lead security team meetings that facilitate secure design. Engage in information security projects that evaluate existing security infrastructure and propose changes as defined by security leadership and architects. Additionally, deliver projects on time, within budget and in accordance with service level agreements (SLAs). Assist with incident response and system stability issues as they occur. This may include involvement outside of regular work hours, and responsiveness is expected. Work in tandem with architects, the security operations center (SOC), incident responders (in cases of anomalous activity and host compromise), and technology infrastructure and development team members. Respond to and handle service and escalation tickets within SLA expectations. Develop security test plans from architectural design. Identify deficiencies and make enhancements to ensure production is not impacted. Follow security engineering fundamentals and processes as outlined in standard frameworks Influence the planning and execution of incident response and postmortem exercises, with a focus on creating measurable benchmarks to show progress (or deficiencies requiring additional attention). Focus on driving security efficiencies, enabling security team members to work on more advanced tasks. Conduct performance testing to stress the limitations of security solutions while at the same time ensuring business innovation and day-to-day processes are not negatively impacted. Additional recruitment details and screening questions: Weekly onsite schedule

3 days including Tuesdays (staff meeting) and Wednesdays (org-wide on-site day)